paypal-account.xyz
Open in
urlscan Pro
5.188.33.171
Malicious Activity!
Public Scan
Submission Tags: @phishunt_io
Submission: On April 18 via api from DE — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 18th 2022. Valid for: 3 months.
This is the only time paypal-account.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 5.188.33.171 5.188.33.171 | 202422 (GHOST) (GHOST) | |
8 | 2 |
ASN202422 (GHOST, LU)
PTR: facai001.example.com
paypal-account.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
paypal-account.xyz
paypal-account.xyz |
1 MB |
0 |
admin-qwerasd.live
Failed
admin-qwerasd.live Failed |
|
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | paypal-account.xyz |
paypal-account.xyz
|
0 | admin-qwerasd.live Failed |
paypal-account.xyz
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
paypal-account.xyz R3 |
2022-04-18 - 2022-07-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://paypal-account.xyz/
Frame ID: 98D1E12E75157758FFD4AAE014BA92BA
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
paypal-account.xyz/ |
689 B 842 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.206b3c99bcd0e426f21e8bd04b1cc7c8.css
paypal-account.xyz/static/css/ |
738 KB 137 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
manifest.3ad1d5771e9b13dbdad2.js
paypal-account.xyz/static/js/ |
800 B 1013 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.1335c66d67a2d991e3dd.js
paypal-account.xyz/static/js/ |
4 MB 900 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.a47ece9283d64e3572f4.js
paypal-account.xyz/static/js/ |
106 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
getiplang
admin-qwerasd.live/auth/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
momgram.png
paypal-account.xyz/static/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_countries_flag4.d3682f0.png
paypal-account.xyz/static/img/ |
71 KB 71 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- admin-qwerasd.live
- URL
- https://admin-qwerasd.live/auth/getiplang
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| webpackJsonp function| setImmediate function| clearImmediate object| __core-js_shared__0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
admin-qwerasd.live
paypal-account.xyz
admin-qwerasd.live
5.188.33.171
4d632111aaf87e0ba9b9d97ee00cf3bd71e1e2b053e36d4dbc639582494195b1
8d4e8460a070d9e6b9a4cc78092b8b8bfd08fc2552d7ee6c8aff3d0d7aedbb88
9c14b809ca4d5de12a569239d46ab8ef5f7ac1b3804c9801583cbafb66d3e550
b3f1bf1d5e25838bcad8535a2b700486644f4ea888e46c77d3e82783cb9da1b4
b95ed0220d3d50675218aebd526741313505e9127094f37c8f52fa08d432c8b0
d7fc2646d7a225ffe9c349f949afcdc7f45dc2fa75d50265314e85c7828d3ee0
fcdf3becb34727e89ae7395ac70df92e4537639ae903784e201f479dd70f3ef0